Preview

Security Risks in Cloud Computing

Powerful Essays
Open Document
Open Document
5810 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Risks in Cloud Computing
Andrew Bergeris TCOM 5223
Andrew Bergeris TCOM 5223
Security Risks in Cloud Computing Security Risks in Cloud Computing

Security Risks in Cloud Computing Abstract 2 Introduction 3 What is Cloud Computing? 3 Personal Use of Cloud 4 Company Use of Cloud 4 Advantages of Cloud Computing 5 Advantages of Cloud Computing for Individuals 6 Advantages of Cloud Computing for Companies 7 Security Risks of Cloud Computing 8 Security Risks of Individual 9 Security Risks for Companies 12 Location of Cloud Computing Severs 13 Conclusion 14

Abstract
Cloud computing is an incredible resource that allows a user to store data over a network. This network is usually accessed over the internet and stored on a server. The cloud creates one location for all the users’ information to be stored and easily accessed. Storing data over the internet on a server brings up a huge security risk to all users. Since it is on a server connected to the internet it is susceptible to internet hackers and foreign countries. Using the cloud presents a major security risk to companies or individual users. Since it is easy for them to access their data from one central location it also lets the hackers do that same thing. The cloud creates a single point of failure if it gets hacked by an individual or another country. A single point of failure is one of the worst security measures to be used. A good security system has multiple different layers incorporated into it so it becomes more difficult to break into. Leaving all information on one central location gives the hacker an easy target with only one account to hack to gain information on multiple different data files and user accounts. Another problem with the cloud technology is that the server the data is stored on could be located in a different country. This causes a major security risk for the companies and individual user’s since different countries have different laws dealing with



Cited: [1] "Cloud Computing." Dictionary.com. Dictionary.com, n.d. Web. 07 Apr. 2013. <http://dictionary.reference.com/browse/cloud computing>. [2] Ducan, Geoff. "Crack This: How to Pick Strong Passwords and Keep Them That Way." Digital Trends. N.p., 29 Jan. 2012. Web. 07 Apr. 2013. <http://www.digitaltrends.com/mobile/crack-this-how-to-pick-strong-passwords-and-keep-them-that-way/>. [3] "Forrester 's Global Data Protection and Privacy Heatmap." Forrester 's Global Data Protection and Privacy Heatmap. N.p., n.d. Web. 07 Apr. 2013. <http://heatmap.forrestertools.com/>. [4] Grocholski, Greg. "Balancing Risk and Reward With Cloud Computing." BusinessNewsDaily.com. N.p., n.d. Web. 07 Apr. 2013. <http://www.businessnewsdaily.com/3812-cloud-computing-risks-rewards.html>. [5] Honan, Mat. "How Apple and Amazon Security Flaws Led to My Epic Hacking." Wired.com. Conde Nast Digital, 04 Aug. 2012. Web. 07 Apr. 2013. <http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all/>. [6] Pfleeger, Charles P., and Shari Lawrence. Pfleeger. Security in Computing. Fourth ed. Upper Saddle River, NJ: Prentice Hall, 2007. Print. [7] "Qik Technology." Qik Technology. N.p., n.d. Web. 07 Apr. 2013. <http://www.qiktechnology.com/tag/cloud-computing>. [8] Symantec. "2011 Cost of Data Breach Study." Symantec.com. Symantec, Mar. 2012. Web. 7 Apr. 2013. <http://www.symantec.com/content/en/us/about/media/pdfs/b-ponemon-2011-cost-of-data-breach-us.en-us.pdf>.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    Ponemon Institute. (2013, May 28). Cost of Data Breach: Global Analysis. Retrieved April 29, 2015, from Ponemon Institute:…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    FINAL Project IS3230

    • 1645 Words
    • 6 Pages

    P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. In Proceedings of the 21st National Information Systems Security Conference, pages 303–314, Oct. 1998.…

    • 1645 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Kim, D. & Solomon, M. G. (2012). Fundamentals of information systems security . Sudbury, MA: Jones & Bartlett Learning, LLC.…

    • 2582 Words
    • 11 Pages
    Powerful Essays
  • Best Essays

    Bibliography: Bauer, Eric and Randee Adams. The Reliability and Availability of Cloud Computing. Hoboken: Wiley, 2012.…

    • 1307 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    9/11 and Airport Security

    • 3569 Words
    • 15 Pages

    McClure, George. "IEEE-USA Today 's Engineer." 02.12 Ieee-usa Today 's Engineer. 2007. Web. 21 Feb. 2012. http://www.todaysengineer.org/2005/Jun/security.asp…

    • 3569 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Kerr, D. (2012, August 7). Amazon addresses security exploit after journalist hack. Retrieved from http://news.cnet.com/8301-1009_3-57488759-83/amazon-addresses-security-exploit-after-journalist-hack/…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Best Essays

    Termpaper

    • 4159 Words
    • 22 Pages

    1.Identify the potential sales and department store transactions that can be stored within the database.…

    • 4159 Words
    • 22 Pages
    Best Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2011). Readings and cases in information security: Law and ethics. Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Better Essays

    References: Conklin, A., Williams, G., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (3rd ed.). New York, NY: McGraw-Hill/Osborne Media.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Stallings, W., & Brown, L. (2012) Computer security: Principles and practice (2nd ed.). Boston, MA: Pearson.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    In the New York Times article, Sean Collins Walsh details the ongoing concerns with Cloud Computing. He discusses the beneficial and problematic financial issues cloud computing is having on the U.S. Government. Walsh discusses the unforeseeable consequences that cloud computing may have for the government due to the technology being fairly…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Cloud Computing

    • 1296 Words
    • 6 Pages

    The world is turning to cloud computing to manage data. Businesses are at the forefront of this new trend with companies such as Google, Amazon, Microsoft, and others leading the way by providing these services. What exactly is cloud computing? According to Turban & Volonino (2011), cloud computing is Internet- based computing in which shared resources (such as hard drives for storage) and software apps are provided to computers and other devices on- demand (p. 48).…

    • 1296 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Business Trend Memo

    • 1299 Words
    • 6 Pages

    Erenben, C. (2009), “Cloud computing: the economic imperative”, eSchool News, 13, 9-26. Retrieved from http://www.eschoolnews.com/emails/esntoday/esntoday061509.htm.…

    • 1299 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Ponemon Institute. (2013, May 28). 2013 Cost of Data Breach: Global Analysis. Retrieved December 19, 2014, from Ponemon Institute: http://www.ponemon.org/local/upload/file/2013%20Report%20GLOBAL%20CODB%20FINAL%205-2.pdf…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Abstract—This paper discusses the security issues that arise in a cloud computing framework. We concentrate on what is typically called the metering problem or “proof of work” where the client can ascertain that the amount it is being billed for by the cloud service is in accordance with the amount of work done by it. We define many different attack scenarios and propose counter schemes for each. Our simulation and theoretical analysis show that the schemes require a reasonably low verification effort at the client side, and provide non-repudiation property.…

    • 4041 Words
    • 17 Pages
    Powerful Essays